analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

sample.xls

Full analysis: https://app.any.run/tasks/a57a1eda-4520-4888-a0aa-a0db027e108b
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: January 18, 2019, 09:44:41
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
macros
macros-on-open
opendir
loader
trojan
Indicators:
MIME: application/vnd.ms-excel
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Author: admin, Last Saved By: Honkong World, Name of Creating Application: Microsoft Excel, Create Time/Date: Thu Dec 6 20:43:11 2018, Last Saved Time/Date: Fri Jan 18 05:00:32 2019, Security: 0
MD5:

CB50DC3F77167F4F165D2F7DC752D2FE

SHA1:

7F4D1CE61172FAB6F2FBC38F7F69B8BF35D6AE1B

SHA256:

C6BF2F20A1DEBA0E50286FD6F18899B34D75F255A0DA2C72AE8DA5BFEF453181

SSDEEP:

1536:79Z+RwPONXoRjDhIcp0fDlaGGx+cL26nAoaTKLTBuZyFGfKm+CWAzFY+LFA:79Z+RwPONXoRjDhIcp0fDlaGGx+cL26A

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • OZUFZVCH.exe (PID: 2308)
      • OZUFZVCH.exe (PID: 4040)
    • Requests a remote executable file from MS Office

      • EXCEL.EXE (PID: 2860)
    • Executable content was dropped or overwritten

      • EXCEL.EXE (PID: 2860)
    • Unusual execution from Microsoft Office

      • EXCEL.EXE (PID: 2860)
    • Connects to CnC server

      • OZUFZVCH.exe (PID: 2308)
  • SUSPICIOUS

    • Application launched itself

      • OZUFZVCH.exe (PID: 4040)
    • Unusual connect from Microsoft Office

      • EXCEL.EXE (PID: 2860)
    • Connects to unusual port

      • OZUFZVCH.exe (PID: 2308)
    • Reads the machine GUID from the registry

      • OZUFZVCH.exe (PID: 2308)
    • Creates files in the user directory

      • OZUFZVCH.exe (PID: 2308)
    • Loads DLL from Mozilla Firefox

      • OZUFZVCH.exe (PID: 2308)
  • INFO

    • Reads Microsoft Office registry keys

      • EXCEL.EXE (PID: 2860)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.xls | Microsoft Excel sheet (48)
.xls | Microsoft Excel sheet (alternate) (39.2)

EXIF

FlashPix

CompObjUserType: Microsoft Office Excel 2003 Worksheet
CompObjUserTypeLen: 38
HeadingPairs:
  • Worksheets
  • 3
TitleOfParts:
  • Sheet1
  • Sheet2
  • Sheet3
HyperlinksChanged: No
SharedDoc: No
LinksUpToDate: No
ScaleCrop: No
AppVersion: 12
CodePage: Windows Latin 1 (Western European)
Security: None
ModifyDate: 2019:01:18 05:00:32
CreateDate: 2018:12:06 20:43:11
Software: Microsoft Excel
LastModifiedBy: Honkong World
Author: admin
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
32
Monitored processes
3
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
drop and start start excel.exe ozufzvch.exe no specs ozufzvch.exe

Process information

PID
CMD
Path
Indicators
Parent process
2860"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /ddeC:\Program Files\Microsoft Office\Office14\EXCEL.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Excel
Version:
14.0.6024.1000
4040"C:\Users\admin\AppData\Local\Temp\OZUFZVCH.exe" C:\Users\admin\AppData\Local\Temp\OZUFZVCH.exeEXCEL.EXE
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
2308"C:\Users\admin\AppData\Local\Temp\OZUFZVCH.exe" C:\Users\admin\AppData\Local\Temp\OZUFZVCH.exe
OZUFZVCH.exe
User:
admin
Integrity Level:
MEDIUM
Total events
595
Read events
563
Write events
25
Delete events
7

Modification events

(PID) Process:(2860) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
Operation:writeName:<h$
Value:
3C6824002C0B0000010000000000000000000000
(PID) Process:(2860) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1033
Value:
Off
(PID) Process:(2860) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1033
Value:
On
(PID) Process:(2860) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel
Operation:writeName:MTTT
Value:
2C0B0000F0C3D07E12AFD40100000000
(PID) Process:(2860) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
Operation:delete valueName:<h$
Value:
3C6824002C0B0000010000000000000000000000
(PID) Process:(2860) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
Operation:delete keyName:
Value:
(PID) Process:(2860) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency
Operation:delete keyName:
Value:
(PID) Process:(2860) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2860) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(2860) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\199ED7
Operation:writeName:199ED7
Value:
040000002C0B00002C00000043003A005C00550073006500720073005C00610064006D0069006E005C0041007000700044006100740061005C004C006F00630061006C005C00540065006D0070005C00730061006D0070006C0065002E0078006C007300000000002200000043003A005C00550073006500720073005C00610064006D0069006E005C0041007000700044006100740061005C004C006F00630061006C005C00540065006D0070005C00010000000000000000DE5E8012AFD401D79E1900D79E190000000000AC020000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
Executable files
2
Suspicious files
1
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
2860EXCEL.EXEC:\Users\admin\AppData\Local\Temp\CVR98AC.tmp.cvr
MD5:
SHA256:
2308OZUFZVCH.exeC:\Users\admin\AppData\Roaming\gn.fess.tmp
MD5:
SHA256:
2308OZUFZVCH.exeC:\Users\admin\AppData\Roaming\Jxu.C.x.tmp
MD5:
SHA256:
2308OZUFZVCH.exeC:\Users\admin\AppData\Roaming\vwh.fvo.tmp
MD5:
SHA256:
2860EXCEL.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RB73MZ6Y\fridaymorning[1].exeexecutable
MD5:9351B28E2C319B7B4105C873A8908687
SHA256:A09766A44F19992BC1B9B6A85B83595F478BADD988BABC16C56338ED3F831AE1
2308OZUFZVCH.exeC:\Users\admin\AppData\Local\Microsoft Vision\18-01-2019_09.45.57binary
MD5:97ECD3BF0C0F67FCFD805C0A622580C3
SHA256:B6E2FDC6ACBEC0E98C744053C6D0812A726D8E5EC28E1CE7D026564AE12010AB
2860EXCEL.EXEC:\Users\admin\AppData\Local\Temp\OZUFZVCH.exeexecutable
MD5:9351B28E2C319B7B4105C873A8908687
SHA256:A09766A44F19992BC1B9B6A85B83595F478BADD988BABC16C56338ED3F831AE1
2308OZUFZVCH.exeC:\Users\admin\AppData\Roaming\FmHlFky.tmptext
MD5:E7CE898AADD69F4E4280010B7808116E
SHA256:C9214BB54F10242AA254F0758372A440C8D8F49934021F8F08B6DF9FB377EB02
2308OZUFZVCH.exeC:\Users\admin\AppData\Roaming\iKug.rC.tmptext
MD5:E7CE898AADD69F4E4280010B7808116E
SHA256:C9214BB54F10242AA254F0758372A440C8D8F49934021F8F08B6DF9FB377EB02
2308OZUFZVCH.exeC:\Users\admin\AppData\Roaming\dhCntfA.tmptext
MD5:E7CE898AADD69F4E4280010B7808116E
SHA256:C9214BB54F10242AA254F0758372A440C8D8F49934021F8F08B6DF9FB377EB02
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
4
DNS requests
1
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2860
EXCEL.EXE
GET
200
145.14.145.248:80
http://oeb-up.000webhostapp.com/uploads/fridaymorning.exe
US
executable
565 Kb
shared
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2860
EXCEL.EXE
145.14.145.248:80
oeb-up.000webhostapp.com
Hostinger International Limited
US
shared
2308
OZUFZVCH.exe
103.53.199.253:4040
NewMedia Express Pte Ltd
HK
malicious

DNS requests

Domain
IP
Reputation
oeb-up.000webhostapp.com
  • 145.14.145.248
shared

Threats

PID
Process
Class
Message
Not Suspicious Traffic
ET INFO Observed Free Hosting Domain (*.000webhostapp .com in DNS Lookup)
2860
EXCEL.EXE
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
2308
OZUFZVCH.exe
A Network Trojan was detected
MALWARE [PTsecurity] Stealer.Win32.AveMaria
2308
OZUFZVCH.exe
A Network Trojan was detected
SC TROJAN_DOWNLOADER Trojan-Downloader Fuerboos Win32
2308
OZUFZVCH.exe
A Network Trojan was detected
SC TROJAN_DOWNLOADER Trojan-Downloader Fuerboos Win32
2308
OZUFZVCH.exe
A Network Trojan was detected
SC TROJAN_DOWNLOADER Trojan-Downloader Fuerboos Win32
2308
OZUFZVCH.exe
A Network Trojan was detected
MALWARE [PTsecurity] Stealer.Win32.AveMaria
2308
OZUFZVCH.exe
A Network Trojan was detected
MALWARE [PTsecurity] Stealer.Win32.AveMaria
25 ETPRO signatures available at the full report
No debug info